Finding ID | Version | Rule ID | IA Controls | Severity |
---|---|---|---|---|
V-3000 | NET1020 | SV-15474r3_rule | ECAT-1 ECAT-2 ECSC-1 | Low |
Description |
---|
Auditing and logging are key components of any security architecture. It is essential for security personnel to know what is being done, attempted to be done, and by whom in order to compile an accurate risk assessment. Auditing the actions on network devices provides a means to recreate an attack, or identify a configuration mistake on the device. |
STIG | Date |
---|---|
Perimeter Router Security Technical Implementation Guide Cisco | 2016-07-07 |
Check Text ( C-12940r3_chk ) |
---|
Review the network device interface ACLs to verify all deny statements are logged. Cisco IOS example: interface FastEthernet 0/0 description external interface peering with ISP or non-DoD network ip address 199.36.92.1 255.255.255.252 ip access-group 100 in … access-list 100 deny icmp any any fragments log access-list 100 deny ip 169.254.0.0 0.0.255.255 any log access-list 100 deny ip 10.0.0.0 0.255.255.255 any log access-list 100 deny ip 172.16.0.0 0.15.255.255 any log access-list 100 deny ip 192.168.0.0 0.0.255.255 any log access-list 100 permit icmp any host 199.36.92.1 echo-reply access-list 100 permit icmp any host 199.36.90.10 echo-reply access-list 100 deny icmp any any log access-list 100 deny ip any any log |
Fix Text (F-3025r4_fix) |
---|
Configure interface ACLs to log all deny statements. |